CORC

浏览/检索结果: 共34条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
对Raviyoyla v1的实际伪造攻击 期刊论文
计算机学报, 2016, 卷号: 39, 期号: 3, 页码: 478-491
姚远; 张斌; 吴文玲
收藏  |  浏览/下载:20/0  |  提交时间:2016/12/09
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
Some new weaknesses in the RC4 stream cipher 会议论文
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1); Zhang, Bin (1); Lin, Dongdai (2)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
improved key recovery attacks on reduced-round salsa20 and chacha 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
Cryptanalysis of Helix and Phelix revisited 会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)
收藏  |  浏览/下载:17/0  |  提交时间:2014/12/16
对Loiss算法的猜测确定分析 期刊论文
中国科学院研究生院学报, 2012, 卷号: 29, 期号: 1, 页码: 125-130
周照存; 刘骏; 冯登国
收藏  |  浏览/下载:29/0  |  提交时间:2012/11/12
on the probability distribution of the carry cells of stream ciphers f-fcsr-h v2 and f-fcsr-h v3 会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Song Haixin; Fan Xiubin; Wu Chuankun; Feng Dengguo
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/22
synthetic linear analysis: improved attacks on cubehash and rabbit 会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Lu Yi; Vaudenay Serge; Meier Willi; Ding Liping; Jiang Jianchun
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
a real-time key recovery attack on the lightweight stream cipher a2u2 会议论文
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing; Feng Xiutao; Feng Dengguo; Wu Chuankun
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
流密码算法Grain的立方攻击 期刊论文
Journal of Software, 2012, 卷号: 23, 期号: 1, 页码: 171-176
宋海欣; 范修斌; 武传坤; 冯登国
收藏  |  浏览/下载:14/0  |  提交时间:2012/11/12


©版权所有 ©2017 CSpace - Powered by CSpace